May 11th, 2026 by Oleg Afonin
Over the years, we have published several articles about the extraction agent. However, the underlying technology changes quickly, and incremental changes often have significant cumulative effects. As a result, many of our older posts are no longer relevant and can be misleading if followed to the letter today. While last year’s recap, Installing and Troubleshooting the Extraction Agent (2025), remains a solid foundation for general setup, it does not account for the most recent hardware and software developments. This article serves as the definitive point of reference, providing an up-to-date recap of everything you need to know about the extraction agent as of May 2026.
April 13th, 2009 by Olga Koksharova
Michael Kassner placed an article about Surveillance Self-Defense in the TechRepublic, where he gives brief outline of the SSD website. Though some can endlessly brood over the grounds for the project foundation, for me one is clear that this site can be very much helpful to put all principal computer security guidelines together and close the gaps in your own security.
There are plenty of excellent knowledge nuggets in section Defensive Technology which includes, Emails, Web Browsers (in one of my previous posts I also wrote about threats posed by switched-on AutoComplete), IMs, File and Disk Encryption… At this points I’d focus your attention at the File and Disk Encryption section which starts with:
April 10th, 2009 by Vladimir Katalov
In case if you missed it: new ATI Catalyst drivers (9.4) now available (you can read the release notes for details). For some reason, some driver files have been renamed (well, not in 9.4, but in 9.3 released a bit earlier, though that version was really buggy and we cannot recommend to use it anyway), and our WPA password recovery (audit) software was not able to recognize Radeon cards anymore.
April 10th, 2009 by Vladimir Katalov
You’re probably aware that our Distributed Password Recovery works with Lotus Notes ID files (as well as with two dozen other file formats, of course). Some sad news: in latest versions of Notes (8.5), encryption has been improved. In older versions, only 64-bit and 128-bit RC2 options were available, but now you can also use AES (128-bit or 256-bit). Well, encryption itself does not actually matter, but the problem is that password verification routine is not much better (worse?) as well: 5,000/10,000 SHA-1 cycles have been added. EDPR will be updated accordingly to support new format (you can subscribe to our mailing list to be notified), of course, but don’t expect the high recovery speed: we can get several hundred passwords per second only. For older versions of Notes, the speed was ~100,000 passwords per second or higher.
April 8th, 2009 by Vladimir Katalov
Looks like a very good system for password cracking (using GPU-accelerated Elcomsoft Distributed Password Recovery), isn’t it? Especially assuming that even single GeForce GTX 295 is faster than Intel Octa-Core CPU (to be released later this year).
April 1st, 2009 by Olga Koksharova
ATI and NVIDIA arranged a new graphic cards fight, claims TweakTown:
April 1st, 2009 by Olga Koksharova
Fresh life experience…A very good friend of mine told me a story I would like to share with you with her kind permission. Recently she has found a new job in a medium size company. She was perfectly satisfied with her new position and new tasks. She also got a well equipped working place including her principal tool for work – computer, which actually she inherited from an ex-employee who lately moved to another company. The company could have bought her a new computer, but what for, if there was working one absolutely ownerless. Windows XP already installed along with numerous useful applications, even her favorite Safari was there.
April 1st, 2009 by Katerina Korolkova, Direktur Humas
Today morning ElcomSoft announced a new tool for password recovery. This one is a hardware, a supernatural amulet of Siberian shamans. Password Recovery Tambourine appears in 4 editions: Pentagon, Glamourous, Russian and Open Source. This hardware requires a special 15-month training with authentic Yakutsk shaman guild. However, if you are patient enough to spend a year and a half in Siberia and not afraid of permanent frost there, then after the training no password would be strong enough for you. You’ll crack it in seconds with your preferable edition of Password Recovery Tambourine. Cultural note The idea of creating Password Recovery Tambourine grew out of the popular belief between Russian system administrators that when nothing else helps you have to rest your hopes on dancing with a ‘BU-BEN (Russian for ‘tambourine’). They say, dancing with a tambourine helps to reanimate one’s server, find bugs, set up operational system and what not. Implementation of this belief to password recovery was not easy, at least 200 ritual dances have been performed during the development stage. Finally,